Privacy

Related Projects

Related Topics

Privacy has become one of the defining issue of the Information Age. CIS has received national recognition for its interdisciplinary and multi-angle examination of privacy, particularly as it relates to emerging technology.

Albert Gidari is the Consulting Director of Privacy at the Stanford Center for Internet and Society. He was a partner for over 20 years at Perkins Coie LLP, achieving a top-ranking in privacy law by Chambers, before retiring to consult with CIS on its privacy program. He negotiated the first-ever "privacy by design" consent decree with the Federal Trade Commission on behalf of Google, which required the establishment of a comprehensive privacy program including third party compliance audits. Mr.

Jennifer Granick fights for civil liberties in an age of massive surveillance and powerful digital technology. As the new surveillance and cybersecurity counsel with the ACLU's Speech, Privacy and Technology Project, she litigates, speaks, and writes about privacy, security, technology, and constitutional rights.

Norberto Andrade is a Postdoctoral Research Fellow scholar at UC Berkeley School of Law, Berkeley Center for Law & Technology (BCLT), and a Fellow at the Hague Institute for the Internationalisation of Law (HiiL, The Netherlands). He has worked as a Scientific Officer at the Institute for Prospective Technological Studies (IPTS) of the European Commission’s Joint Research Centre, and as a legal expert in the field of telecommunications at the Portuguese Regulatory Authority for Communications (ANACOM).

Charles Belle is the founder and Executive Director of Startup Policy Lab, a new nonprofit think tank dedicated to connecting policymakers and the startup community. Examining public policy at the nexus of startups and technology, Charles' research is currently focused on privacy and how to support local government open data initiatives while simultaneously protecting citizen privacy.

We're thrilled to announce the release of Privicons for Google Chrome, a tool for helping users deal with email carelessness: innocent misunderstandings and omissions about email privacy, like unwanted forwards or reply-alls, that embarrass the person whose email is passed along without permission.

Representatives Anna Eshoo and Zoe Lofgren joined eight other members of Congress in urging the House Judiciary Committee to reject SOPA because it would cause "serious and long term damage to the technology industry" -- "one of the few bright spots in our economy."

Nine of the leading internet companies, including Google, Facebook, Twitter and Zynga also sent a letter to key member of the Committee explaining that SOPA would jeopardize protections that "have been a cornerstone of the U.S. Internet and technology industry’s growth and success."

Yesterday the Digital Advertising Alliance (DAA) announced a supplementary set of self-regulatory principles for third parties on the web (pdf, press release). This post is a brief — and far from comprehensive — overview of improvements, continued deficiencies, and procedural issues.

Just Security is pleased to announce the launch of an online symposium on United States v. Microsoft, which will be argued at the U.S. Supreme Court on February 27. The question in the case is whether Section 2703 of the Stored Communications Act (SCA) allows a court to order a U.S. provider of email services to disclose electronic communications stored outside the United States.

Abstract. Federal law enforcement officials in the United States have recently renewed their periodic demands for legislation to regulate encryption. While they offer few technical specifics, their general proposal—that vendors must retain the ability to decrypt for law enforcement the devices they manufacture or communications their services transmit—presents intractable problems that would-be regulators must not ignore.

Imagine it is the spring of 2019. A bottom-feeding website, perhaps tied to Russia, “surfaces” video of a sex scene starring an 18-year-old Kirsten Gillibrand. It is soon debunked as a fake, the product of a user-friendly video application that employs generative adversarial network technology to convincingly swap out one face for another.

Arguing that a defendant’s conviction for website hacking should be overturned because legitimate, highly valuable security and privacy research commonly employs techniques that are essentially identical to what the defendant did and that such independent research is of great value to academics, government regulators and the public even when – often especially when — conducted without a website owner’s permission.

Arguing that the information publicly available on the NSA's Upstream program, combined with an understanding of how the Internet works, means plaintiff Wikimedia has met its burden of proving standing to challenge Upstream.

Arguing that if the court should not compel Apple to create software to enable unlocking and search of the San Bernardino shooter’s iPhone, it will jeopardize digital and personal security more generally.

"“This is the kind of technological advancement that’s intended to bring public safety and individual safety to the forefront,” Albert Gidari, the director of privacy at Stanford University’s Center For Internet and Society, told me over the phone."

"Danielle Citron, a Twitter trust and safety partner and a professor at the University of Maryland Francis King Carey School of Law, emphasized that if Harvey’s team is sometimes slow to address abuse, it’s only because they care so much about getting each case right. “They mean it when they say they care about speech that terrorizes and silences,” Citron said. “They really do have their users’ speech issues in mind in a way that’s very holistic.”"

"Business law professor and author of the study Scott Shackelford says it would be similar to the National Transportation Safety Board investigation model. He says that model is applicable to cybersecurity.

“It’s not only formal investigators that dig into the details of why an airplane happened to crash, but they look into bigger issues like culture at manufacturers, at airlines,” says Shackelford. “We thought a similar approach would be really helpful for cybersecurity because typically, it’s not just one thing that’s at fault in big data breaches.”"

Pages

Join Troy Sauro, Senior Privacy Counsel, Google Inc., for a discussion about his journey from being a litigation attorney in a big law firm to becoming a Google privacy counsel. Sponsored by the Center for Internet and Society at Stanford Law School. CIS Director of Privacy Albert Gidari will moderate the discussion.

Pages

Nobody likes to wait in line. So today, Amazon removed that unpleasantness from the neighborhood grocery store. At Amazon Go, you walk in, pick up your groceries and walk out.

There are no checkout lines or scanners and almost no employees, just sensors and cameras. But what is that convenience going to cost you? We talk with Geekwire’s Todd Bishop and University of Washington law professor and privacy expert Ryan Calo.

Revenge porn is the non-consensual sharing of nude photos or videos. Thirty-eight states and the District of Columbia have revenge porn laws, according to the Cyber Civil Rights Initiative. And now Congress is considering a bill that would make revenge porn a federal crime. Marketplace Tech host Molly Wood talks with Danielle Citron, an adviser on the bill and a law professor at the University of Maryland.

You have reason to believe you’re being monitored by the government, that they are following you and cataloging everywhere you go and everyone you talk to. The knowledge haunts you, and has a chilling effect on everything you do. But can you sue to stop it? In this month’s episode, the ABA Journal’s Lee Rawles speaks with Jeffrey Vagle about his new book, Being Watched: Legal Challenges to Government Surveillance about the current challenges to government surveillance, and a seminal Supreme Court case in 1972 whose effects are still being felt today.